[Bug 220823] security/strongswan: [security] Update to the latest version (v5.5.3), current (v5.5.2) is vulnerable

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Tue Jul 18 10:07:04 UTC 2017


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=220823

            Bug ID: 220823
           Summary: security/strongswan: [security] Update to the latest
                    version (v5.5.3), current (v5.5.2) is vulnerable
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Many People
          Priority: ---
         Component: Individual Port(s)
          Assignee: freebsd-ports-bugs at FreeBSD.org
          Reporter: i.dani at outlook.com
                CC: strongswan at Nanoteq.com
                CC: strongswan at Nanoteq.com
             Flags: maintainer-feedback?(strongswan at Nanoteq.com)

The current version avilable for FreeBSD is vulnerable since 30.05.2017 and has
already been patched upstream. The current contains two DoS-vuln's.

Changelog: https://wiki.strongswan.org/versions/65

Available version: 5.5.2
Patched version: 5.5.3

Security:
- Fixed a DoS vulnerability in the gmp plugin that was caused by insufficient
input validation when verifying RSA signatures. More specifically,
mpz_powm_sec() has two requirements regarding the passed exponent and modulus
that the plugin did not enforce, if these are not met the calculation will
result in a floating point exception that crashes the whole process.

This vulnerability has been registered as CVE-2017-9022 [1].
Please refer to our blog for details. [2]

- Fixed a DoS vulnerability in the x509 plugin that was caused because the
ASN.1 parser didn't handle ASN.1 CHOICE types properly, which could result in
an infinite loop when parsing X.509 extensions that use such types.

This vulnerability has been registered as CVE-2017-9023 [3].
Please refer to our blog for details. [4]

[1] https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9022
[2]
https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9022).html
[3] https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9023
[4]
https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9023).html

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-ports-bugs mailing list